{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:18:05Z","timestamp":1760955485055},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2014,3,23]],"date-time":"2014-03-23T00:00:00Z","timestamp":1395532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11042-014-1958-6","type":"journal-article","created":{"date-parts":[[2014,3,22]],"date-time":"2014-03-22T03:30:05Z","timestamp":1395459005000},"page":"7181-7193","source":"Crossref","is-referenced-by-count":19,"title":["Reversible DCT-based data hiding in stereo images"],"prefix":"10.1007","volume":"74","author":[{"given":"Wen-Chao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Ling-Hwei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,23]]},"reference":[{"key":"1958_CR1","unstructured":"Bai NY, Chiang JY (1998) \u201cData hiding using binocular fusion of stereo pairs\u201d. Proceeding of the eighth national conference in information security. pp. 245-254"},{"issue":"4","key":"1958_CR2","doi-asserted-by":"crossref","first-page":"043024\u20131","DOI":"10.1117\/1.3009554","volume":"17","author":"P Campisi","year":"2008","unstructured":"Campisi P (2008) Object oriented stereo image digital watermarking. J Electron Imaging 17(4):043024\u20131\u2013043024\u20135","journal-title":"J Electron Imaging"},{"key":"1958_CR3","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 141:123\u2013138","journal-title":"Inf Sci"},{"key":"1958_CR4","first-page":"429","volume-title":"Digital watermarking and steganography","author":"IJ Cox","year":"2008","unstructured":"Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann Publisher, Burlington, pp 429\u2013495"},{"key":"1958_CR5","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1117\/12.465317","volume":"4675","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Du R (2002) Lossless data embedding for all image formats. Proc SPIE 4675:572\u2013583","journal-title":"Proc SPIE"},{"key":"1958_CR6","first-page":"3","volume-title":"Information hiding techniques for steganography and digital watermark","author":"S Katzenbeisser","year":"2000","unstructured":"Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermark. Artech House, Inc, Massachusetts, p 3"},{"issue":"6","key":"1958_CR7","doi-asserted-by":"crossref","first-page":"2097","DOI":"10.1016\/j.patcog.2007.11.018","volume":"41","author":"CC Lee","year":"2008","unstructured":"Lee CC, Wu HC, Tsai CS, Chu YP (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn 41(6):2097\u20132106","journal-title":"Pattern Recogn"},{"issue":"2","key":"1958_CR8","first-page":"214","volume":"5","author":"CC Lin","year":"2010","unstructured":"Lin CC, Shiu PF (2010) DCT-based reversible data hiding scheme. J Softw 5(2):214\u2013224","journal-title":"J Softw"},{"key":"1958_CR9","doi-asserted-by":"crossref","unstructured":"Luo T, Jiang G, Wang X, Yu M, Shao F, Peng Z (2013) \u201cStereo image watermarking scheme for authentication with self-recovery capability using inter-view reference sharing\u201d. Multimedia Tools and Applications. Published online","DOI":"10.1007\/s11042-013-1435-7"},{"key":"1958_CR10","unstructured":"Middlebury Stereo Datasets, http:\/\/vision.middlebury.edu\/stereo\/data\/ ."},{"issue":"9","key":"1958_CR11","doi-asserted-by":"crossref","first-page":"2687","DOI":"10.1016\/j.sigpro.2013.03.036","volume":"93","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Chen YC (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687\u20132695","journal-title":"Signal Process"},{"issue":"7","key":"1958_CR12","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circ Syst Video Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"1958_CR13","doi-asserted-by":"crossref","unstructured":"Rengarajaswamy C, Vel Murugan K (2013) \u201cSeparable extraction of concealed data and compressed image\u201d. Proc. ICEVENT. pp. 1\u20135","DOI":"10.1109\/ICEVENT.2013.6496573"},{"key":"1958_CR14","doi-asserted-by":"crossref","unstructured":"Shrikalaa M, Mathivanan P, Leena Jasmine JS (2013) \"Conversion of 2D stegano images into a 3D stereo image using RANSAC\". IEEE Conference on Information and Communication Technologies (ICT 2013). pp. 686\u2013690","DOI":"10.1109\/CICT.2013.6558182"},{"issue":"8","key":"1958_CR15","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"1958_CR16","doi-asserted-by":"crossref","unstructured":"Westfeld A, Pfitzmann A (2000) \u201cAttack on Steganographic systems\u201d. Lect Notes Comput Sci, vol. 1768, Springer-Verlag, Berlin, pp. 61\u201375","DOI":"10.1007\/10719724_5"},{"key":"1958_CR17","doi-asserted-by":"crossref","unstructured":"Wong K, Tanaka K (2010) \u201cDCT based scalable scrambling method with reversible data hiding functionality\u201d. Proc. 4th ISCCSP. pp 1\u20134","DOI":"10.1109\/ISCCSP.2010.5463307"},{"issue":"2","key":"1958_CR18","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TMM.2012.2229262","volume":"15","author":"X Zhang","year":"2013","unstructured":"Zhang X (2013) Reversible data hiding with optimal value transfer. IEEE Trans Multimed 15(2):316\u2013325","journal-title":"IEEE Trans Multimed"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1958-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-1958-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1958-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T16:27:15Z","timestamp":1565281635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-1958-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,23]]},"references-count":18,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["1958"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-1958-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,23]]}}}